23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Step 3: To perform the acquisition of the SQL Server data with WFT, the batch<br />

file (wftSQL.bat) was run by us<strong>in</strong>g the follow<strong>in</strong>g syntax.<br />

D:\IR\wft\wftSQL.bat TEST-STATION\SQLEXPRESS arkar qwe123AUT<br />

Figure A19.4: Screenshot of the trusted command prompt runn<strong>in</strong>g on the<br />

compromised system<br />

Step 4: Then, the <strong>in</strong>vestigator pressed ‘ENTER’ to start the acquisition.<br />

212

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!